rfc9940.original.xml   rfc9940.xml 
<?xml version='1.0' encoding='utf-8'?> <?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE rfc [ <!DOCTYPE rfc [
<!ENTITY RFC3877 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R <!ENTITY nbsp "&#160;">
FC.3877.xml"> <!ENTITY zwsp "&#8203;">
<!ENTITY RFC6632 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R <!ENTITY nbhy "&#8209;">
FC.6632.xml"> <!ENTITY wj "&#8288;">
<!ENTITY RFC8342 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R
FC.8342.xml">
<!ENTITY RFC8632 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R
FC.8632.xml">
<!ENTITY RFC9232 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R
FC.9232.xml">
<!ENTITY RFC9315 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R
FC.9315.xml">
<!ENTITY RFC9417 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.R
FC.9417.xml">
<!ENTITY I-D.ietf-nmop-network-anomaly-architecture SYSTEM "http://xml2rfc.iet
f.org/public/rfc/bibxml3/reference.I-D.ietf-nmop-network-anomaly-architecture">
<!ENTITY I-D.ietf-nmop-network-incident-yang SYSTEM "http://xml2rfc.ietf.org/p
ublic/rfc/bibxml3/reference.I-D.ietf-nmop-network-incident-yang">
]> ]>
<?rfc toc="yes"?> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft
<?rfc tocompact="yes"?> -ietf-nmop-terminology-23" number="9940" consensus="true" category="info" obsole
<?rfc tocdepth="3"?> tes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth
<?rfc tocindent="yes"?> ="3" symRefs="true" sortRefs="true" version="3">
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft
-ietf-nmop-terminology-23" category="info" obsoletes="" updates="" submissionTyp
e="IETF" xml:lang="en" tocInclude="true" tocDepth="3" symRefs="true" sortRefs="t
rue" version="3">
<front> <front>
<title abbrev="Network Fault Terminology">Some Key Terms for Network Fault a nd Problem Management</title> <title abbrev="Network Fault Terminology">Some Key Terms for Network Fault a nd Problem Management</title>
<seriesInfo name="RFC" value="9940"/>
<seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
<author initials="N." surname="Davis" fullname="Nigel Davis" role="editor"> <author initials="N." surname="Davis" fullname="Nigel Davis" role="editor">
<organization>Ciena</organization> <organization>Ciena</organization>
<address> <address>
<postal> <postal>
<street/>
<city/>
<country>United Kingdom</country> <country>United Kingdom</country>
</postal> </postal>
<email>ndavis@ciena.com</email> <email>ndavis@ciena.com</email>
</address> </address>
</author> </author>
<author initials="A." surname="Farrel" fullname="Adrian Farrel" role="editor "> <author initials="A." surname="Farrel" fullname="Adrian Farrel" role="editor ">
<organization>Old Dog Consulting</organization> <organization>Old Dog Consulting</organization>
<address> <address>
<postal> <postal>
<street/>
<city/>
<country>United Kingdom</country> <country>United Kingdom</country>
</postal> </postal>
<email>adrian@olddog.co.uk</email> <email>adrian@olddog.co.uk</email>
</address> </address>
</author> </author>
<author fullname="Thomas Graf" initials="T" surname="Graf"> <author fullname="Thomas Graf" initials="T" surname="Graf">
<organization>Swisscom</organization> <organization>Swisscom</organization>
<address> <address>
<postal> <postal>
skipping to change at line 86 skipping to change at line 63
<city>Nanjing</city> <city>Nanjing</city>
<region>Jiangsu</region> <region>Jiangsu</region>
<code>210012</code> <code>210012</code>
<country>China</country> <country>China</country>
</postal> </postal>
<email>bill.wu@huawei.com</email> <email>bill.wu@huawei.com</email>
</address> </address>
</author> </author>
<author initials="C." surname="Yu" fullname="Chaode Yu"> <author initials="C." surname="Yu" fullname="Chaode Yu">
<organization>Huawei Technologies</organization> <organization>Huawei</organization>
<address> <address>
<email>yuchaode@huawei.com</email> <email>yuchaode@huawei.com</email>
</address> </address>
</author> </author>
<date year="2025"/> <!-- [rfced] Authors' Addresses: We see that Qin Wu's affiliation is
listed as Huawei in this document. Please confirm that this is as desired.
We ask because we see that Qin Wu's affiliation is mostly listed as Huawei
after RFC 9000, but as "Huawei Technologies" in RFCs 9005, 9353, 9358, and 9731.
-->
<date year="2026" month="February"/>
<area>OPS</area>
<workgroup>nmop</workgroup>
<keyword>Problem</keyword> <keyword>Problem</keyword>
<keyword>Event</keyword> <keyword>Event</keyword>
<keyword>Fault</keyword> <keyword>Fault</keyword>
<keyword>Occurrence</keyword> <keyword>Occurrence</keyword>
<keyword>Incident</keyword> <keyword>Incident</keyword>
<keyword>Anomally</keyword> <keyword>Anomaly</keyword>
<keyword>Symptom</keyword> <keyword>Symptom</keyword>
<keyword>Alert</keyword> <keyword>Alert</keyword>
<keyword>Alarm</keyword> <keyword>Alarm</keyword>
<abstract> <abstract>
<t>This document sets out some terms that are fundamental to a common unde rstanding <t>This document sets out some terms that are fundamental to a common unde rstanding
of network fault and problem management within the IETF.</t> of network fault and problem management within the IETF.</t>
<t>The purpose of this document is to bring clarity to discussions and oth er work <t>The purpose of this document is to bring clarity to discussions and oth er work
related to network fault and problem management, in particular to YANG data models and management protocols related to network fault and problem management -- in particular, to YA NG data models and management protocols
that report, make visible, or manage network faults and problems.</t> that report, make visible, or manage network faults and problems.</t>
</abstract> </abstract>
</front> </front>
<middle> <middle>
<section anchor="introduction" numbered="true" toc="default"> <section anchor="introduction" numbered="true" toc="default">
<name>Introduction</name> <name>Introduction</name>
<t>Successful operation of large networks depends on effective network man agement. This requires a <t>Successful operation of large networks depends on effective network man agement. This requires a
virtuous circle of network control, network observability, network anal ytics, network assurance, and back to virtuous circle of network control, network observability, network anal ytics, network assurance, and back to
network control. Network fault and problem management <xref target="RFC 6632" /> is an important aspect of network management and network control. Network fault and problem management <xref target="RFC 6632" /> is an important aspect of network management and
control solutions. It deals with the detection, reporting, inspection, isolation, correlation, and management of events within the control solutions. It deals with the detection, reporting, inspection, isolation, correlation, and management of events within the
network. The intention of this document is to focus on those events tha network.
t have a negative effect on the network&apos;s ability to The intention of this document is to focus on those events that have a
forward traffic according to expected behavior and so deliver services, negative effect on the network's ability to forward traffic according
the ability to control and operate the network, and other to expected behaviors that may reduce the network's ability to
faults that reduce the quality or reliability of the delivered service. deliver services. Such events may also impact the ability to
The concept of fault and problem management extends to include actions taken to control and operate the network. The document also considers other
determine the causes of problems and to work toward recovery of expecte faults that reduce the quality or reliability of the delivered service.
d network behavior.</t> The concept of fault and problem management extends to include actions taken to
determine the causes of problems and to work toward recovery of expecte
d network behavior.
</t>
<t>A number of work efforts within the IETF seek to provide components of a fault <t>A number of work efforts within the IETF seek to provide components of a fault
management system, such as YANG data models or management protocols. It is important that management system, such as YANG data models or management protocols. It is important that
a common terminology is used so that there is a clear understanding of a common terminology be used so that there is a clear understanding of
how the how the
elements of the management and control solutions fit together, and how elements of the management and control solutions fit together and how f
faults and aults and
problems will be handled.</t> problems will be handled.</t>
<t>This document sets out some terms that are fundamental to a common unde rstanding of network fault and <t>This document sets out some terms that are fundamental to a common unde rstanding of network fault and
problem management. While "faults" and "problems" are concepts that ap ply at all levels of technology in problem management. While "faults" and "problems" are concepts that ap ply at all levels of technology in
the Internet, the scope of this document is restricted to the network l ayer and below, hence this document the Internet, the scope of this document is restricted to the network l ayer and below; hence, this document
is specifically about "network fault and problem management." The conce pt of "incidents" is also touched on is specifically about "network fault and problem management." The conce pt of "incidents" is also touched on
in this document, where an incident results from one or more problems a nd is the disruption of a network in this document, where an incident results from one or more problems a nd is the disruption of a network
service.</t> service.</t>
<t>Note that some useful terms are defined in <xref target="RFC3877" /> an d <xref target="RFC8632" />. The <t>Note that some useful terms are defined in <xref target="RFC3877" /> an d <xref target="RFC8632" />. The
definitions in this document are informed by those documents, but they are not dependent on that prior definitions in this document are informed by those documents, but they are not dependent on that prior
work.</t> work.</t>
</section> </section>
<section anchor="usage" numbered="true" toc="default"> <section anchor="usage" numbered="true" toc="default">
<name>Usage of Terms</name> <name>Usage of Terms</name>
<t>The terms defined in this document are intended for consistent use with in the IETF in the scope of <t>The terms defined in this document are intended for consistent use with in the IETF in the scope of
network fault and problem management. Where similar concepts are descri bed in other bodies, an attempt has been network fault and problem management. Where similar concepts are descri bed in other bodies, an attempt has been
made to harmonize with those other descriptions, but there is care need ed where terms are not used consistently made to harmonize with those other descriptions, but care is needed whe re terms are not used consistently
between bodies or where terms are applied outside the network layer. If other bodies find the terminology between bodies or where terms are applied outside the network layer. If other bodies find the terminology
defined in this document useful, they are free to use it.</t> defined in this document useful, they are free to use it.</t>
<t>The purpose of this document is to define the following terms for use i n other documents. Other terms are defined <t>The purpose of this document is to define the following terms for use i n other documents. Other terms are defined
to enable those definitions and may also be used by other documents, al though that is not the principal purpose of to enable those definitions and may also be used by other documents, al though that is not the principal purpose of
their definitions here.</t> their definitions here.</t>
<ul spacing="compact"> <ul spacing="compact">
<li>Event</li> <li>Event</li>
<li>State</li> <li>State</li>
<li>Fault</li> <li>Fault</li>
<li>Problem</li> <li>Problem</li>
<li>Symptom</li> <li>Symptom</li>
<li>Cause</li> <li>Cause</li>
<li>Alert</li> <li>Alert</li>
<li>Alarm</li> <li>Alarm</li>
</ul> </ul>
<t>When other documents make use of the terms as defined in this document, it is suggested here that such uses should <t>When other documents make use of the terms as defined in this document, it is suggested here that such uses should
use capitalization of the terms as in this document to help distinguish them from colloquial uses, and should use capitalization of the terms as in this document to help distinguish them from colloquial uses and should
include an early section listing the terms inherited from this document with a citation.</t> include an early section listing the terms inherited from this document with a citation.</t>
</section> </section>
<section anchor="terms" numbered="true" toc="default"> <section anchor="terms" numbered="true" toc="default">
<name>Terminology</name> <name>Terminology</name>
<t>This section contains key terms. It is split into three subsections.</t > <t>This section contains key terms. It is split into three subsections.</t >
<ul> <ul>
<li> <li>
<t><xref target="context" /> contains terms that help to set the conte xt for network fault and problem management systems.</t> <t><xref target="context" /> contains terms that help set the context for network fault and problem management systems.</t>
</li> </li>
<li> <li>
<t><xref target="core" /> includes specific and detailed core terms th at will be used in other documents that describe elements of <t><xref target="core" /> includes specific and detailed core terms th at will be used in other documents that describe elements of
the network fault and problem management systems.</t> the network fault and problem management systems.</t>
</li> </li>
<li> <li>
<t><xref target="other" /> provides three further terms that may be he lpful.</t> <t><xref target="other" /> provides three further terms that may be he lpful.</t>
</li> </li>
</ul> </ul>
skipping to change at line 210 skipping to change at line 201
<t>This section includes some terminology that helps describe the contex t for the rest of this work. The terms may be viewed as a <t>This section includes some terminology that helps describe the contex t for the rest of this work. The terms may be viewed as a
cascaded sequence of processes, starting with Network Telemetry and b uilding to Network Observability. The definitions are deliberately kept cascaded sequence of processes, starting with Network Telemetry and b uilding to Network Observability. The definitions are deliberately kept
relatively terse. Further documents may expand on these terms without loss of specificity. Such contextualization (if any) relatively terse. Further documents may expand on these terms without loss of specificity. Such contextualization (if any)
should be highlighted clearly in those documents.</t> should be highlighted clearly in those documents.</t>
<dl newline="false" spacing="normal"> <dl newline="false" spacing="normal">
<dt>Network Telemetry:</dt> <dt>Network Telemetry:</dt>
<dd><t>This is defined in <xref target="RFC9232" /> and describes t he process of collecting operational network data categorized <dd><t>This is defined in <xref target="RFC9232" /> and describes t he process of collecting operational network data categorized
according to the network plane (e.g., layer 3, layer 2, and layer 1) from which it was derived. Data collected through the according to the network plane (e.g., Layer 3, Layer 2, and Layer 1) from which it was derived. Data collected through the
Network Telemetry process does not contain any data related to service definitions Network Telemetry process does not contain any data related to service definitions
(i.e., "intent" per Section 3.1 of <xref target="RFC9315" /> (i.e., "intent" per <xref target="RFC9315" section="3.1"/>).
).</t></dd> </t>
</dd>
<dt>Network Monitoring:</dt> <dt>Network Monitoring:</dt>
<dd><t>This is the process of keeping a continuous record of functi ons related to a network topology. It involves tracking <dd><t>This is the process of keeping a continuous record of functi ons related to a network topology. It involves tracking
various aspects such as traffic patterns, device health, per various aspects such as traffic patterns, device health, per
formance metrics, and overall network behaviour. This approach formance metrics, and overall network behavior. This approach
differentiates network monitoring from resource or device mo differentiates Network Monitoring from resource or device mo
nitoring, which focuses on individual components or resources nitoring, which focuses on individual resources or components
(<xref target="core"/>).</t></dd> (<xref target="core"/>).</t>
</dd>
<dt>Network Analytics:</dt> <dt>Network Analytics:</dt>
<dd><t>This is the process of deriving analytical insights from ope rational network data. A process could be executed by <dd><t>This is the process of deriving analytical insights from ope rational network data. A process could be executed by
a piece of software, a system, or a human that analyzes oper ational data and outputs new analytical data related to the operational a piece of software, a system, or a human that analyzes oper ational data and outputs new analytical data related to the operational
data, for example, a symptom.</t></dd> data -- for example, a symptom.</t></dd>
<dt>Network Observability:</dt> <dt>Network Observability:</dt>
<dd><t>This is the process of enabling network behavioral assessmen t through analysis of observed operational network data (logs, alarms, traces, <dd><t>This is the process of enabling network behavioral assessmen t through analysis of observed operational network data (logs, alarms, traces,
etc.) with the aim of detecting symptoms of network behavior etc.) with the aim of detecting symptoms of network behavior
, and to identify anomalies and their causes. Network Observability begins , and identifying anomalies and their causes. Network Observability begins
with information gathered using Network Monitoring tools and with information gathered using Network Monitoring tools. Th
that may be further enriched with other operational data. The expected at information may be further enriched with other operational data. The expected
outcome of the observability processes is identification and analysis of deviations in observed state versus the expected state of a outcome of the observability processes is identification and analysis of deviations in observed state versus the expected state of a
network.</t></dd> network.</t>
</dd>
</dl> </dl>
<t>Thus, there is a cascaded sequence where the following relationships apply:</t> <t>Thus, there is a cascaded sequence where the following relationships apply:</t>
<ul> <ul>
<li>Network Telemetry is the process of collecting operational data from a network.</li> <li>Network Telemetry is the process of collecting operational data from a network.</li>
<li>Network Monitoring is the process of creating/keeping a record o f data gathered in Network Telemetry.</li> <li>Network Monitoring is the process of creating/keeping a record o f data gathered in Network Telemetry.</li>
<li>Network Analytics is the process of deriving insight through the data recorded in Network Monitoring.</li> <li>Network Analytics is the process of deriving insight through the data recorded in Network Monitoring.</li>
<li>Network Observability is the process of enabling behavioral asse ssment of a network through Network Analytics.</li> <li>Network Observability is the process of enabling behavioral asse ssment of a network through Network Analytics.</li>
</ul> </ul>
</section> </section>
<section anchor="core" numbered="true" toc="default"> <section anchor="core" numbered="true" toc="default">
<name>Core Terms</name> <name>Core Terms</name>
<t>The terms are presented below in an order that is intended to flow su ch that it is possible <t>The terms in this section are presented in an order that is intended to flow such that it is possible
to gain understanding reading top to bottom. The figures and explana tions in <xref target="explain" /> to gain understanding reading top to bottom. The figures and explana tions in <xref target="explain" />
may aid understanding the terms set out here.</t> may aid understanding the terms set out here.</t>
<dl newline="false" spacing="normal"> <dl newline="false" spacing="normal">
<dt>Resource:</dt> <dt>Resource:</dt>
<dd><t>An element of a network system.</t> <dd><t>An element of a network system.
<t>Resource is a recursive concept so that a Resource may be a </t>
collection of <ul>
other Resources (for example, a network node comprises a col <li>
lection of network interfaces).</t></dd> <t>Resource is a recursive concept so that a Resource may be
a collection of other Resources (for example, a network node
comprises a collection of network interfaces).</t>
</li>
</ul>
</dd>
<dt>Characteristic:</dt> <dt>Characteristic:</dt>
<dd><t>Observable or measurable aspect or behavior associated with a Resource.</t> <dd><t>Observable or measurable aspect or behavior associated with a Resource.</t>
<ul> <ul>
<li> <li>
<t>A Characteristic may be considered to be built on facts (see <t>A Characteristic may be considered to be built on facts (see
'Value', below) and the contexts and descriptors "Value", below) and the contexts and descriptors that identify
that identify and give meaning to the facts.</t> and give meaning to the facts.</t>
</li> </li>
<li> <li>
<t>The term "Metric" <xref target="RFC9417" /> is another w <t>The term "Metric" (see "metric" in <xref target="RFC9417
ord for a measurable Characteristic which may also " />) is another word
be thought of as analogous to a 'variable'.</t> for a measurable Characteristic, which may also be thought of as
analogous to a "variable".
</t>
</li> </li>
</ul></dd> </ul></dd>
<dt>Value:</dt> <dt>Value:</dt>
<dd><t>A Value is a measure of a Characteristic associated with a <dd><t>A measure of a Characteristic associated with a
Resource. It may be in the form of a categorization (e.g., h Resource. It may be in the form of a categorization (e.g., high
igh or low), or low), an integer (e.g., a count or gauge), or a reading of a
an integer (e.g., a count or gauge), or a reading of a conti continuous variable (e.g., an analog measurement), etc.</t>
nuous variable (e.g., an </dd>
analog measurement), etc.</t></dd>
<dt>Change:</dt> <dt>Change:</dt>
<dd><t>In the context of Network Monitoring, a Change is the variat <dd><t>In the context of Network Monitoring, the
ion in the Value of a variation in the Value of a Characteristic associated with a
Characteristic associated with a Resource and may arise over Resource. A Change may arise over a period of time.</t>
a period of time.</t> <ul>
<ul> <li>
<li> <t>Not all Changes are noteworthy (i.e., they do not have Relev
<t>Not all Changes are noteworthy (i.e., they do not have R ance).</t>
elevance).</t> </li>
</li> <li>
<li> <t>Perception of Change depends upon Detection, the sampling ra
<t>Perception of Change depends upon Detection, the samplin te/accuracy/detail, and perspective.</t>
g rate/accuracy/detail, and perspective.</t> </li>
</li> <li>
<li> <t>It may be helpful to qualify this as "Value Change" because t
<t>It may be helpful to qualify this as "Value Change" beca he English word "change" is often heavily used.</t>
use the English word "change" is often heavily used.</t> </li>
</li> </ul>
</ul> </dd>
</dd>
<dt>Event:</dt> <dt>Event:</dt>
<dd><t>The variation in Value of a Characteristic of a Resource at <dd><t>The variation in Value of a Characteristic of a Resource
a distinct moment in at a distinct moment in time (i.e., the period is
time (i.e., the period is negligible).</t> negligible).
<ul> </t>
<li> <ul>
<t>Compared with a Change, which may be over a period of ti <li>
me, an Event happens at a <t>Compared with a Change, which may be over a period of time, an
distinct moment in time. Thus, an Event may be the obser Event happens at a distinct moment in time. Thus, an Event may be
vation of a Change.</t> the observation of a Change.</t>
</li> </li>
</ul> </ul>
</dd> </dd>
<dt>Condition:</dt> <dt>Condition:</dt>
<dd><t>A Condition is an interpretation of the Values of a set of o <dd><t>An interpretation of the Values of a set of
ne or more Characteristics of a Resource (with one or more Characteristics of a Resource (with respect to
respect to working order or some other aspect relevant to th working order or some other aspect relevant to the Resource
e Resource purpose/application), for purpose/application) -- for example, "low available memory". Thus,
example "low available memory". Thus, it is the output of a it is the output of a function applied to a set of one or more
function applied to a set of one or more variables.</t></dd> variables.</t></dd>
<dt>State:</dt> <dt>State:</dt>
<dd><t>A particular Condition that a Resource has (i.e., it is in a <dd><t>A particular Condition that a Resource has (i.e., it is in
State) at a specific time. a State) at a specific time. For example, a router may report
For example, a router may report the total amount of memory the total amount of memory it has and how much is free. These
it has, and how much is free. These are the are the Values of two Characteristics of a Resource. These Values
Values of two Characteristics of a Resource. These Values ca can be interpreted to determine the Condition of the Resource,
n be interpreted to determine the Condition and that may determine the State of the router, such as shortage
of the Resource, and that may determine the State of the rou of memory.</t>
ter, such as shortage of memory.</t> <ul>
<ul> <li>
<li> <t>While a State may be observed at a specific moment in time,
<t>While a State may be observed at a specific moment in ti it
me, it is actually is actually determined by summarizing measurement over time in a
determined by summarizing measurement over time in a pro process sometimes called State compression.</t>
cess sometimes </li>
called State compression.</t> <li>
</li> <t>It may be helpful to qualify this as "Resource State" to mak
<li> e
<t>It may be helpful to qualify this as "Resource State" to clear the distinction between this and other uses of "state" such
make clear the distinction between this and as "protocol state".</t>
other uses of "state" such as "protocol state".</t> </li>
</li> <li>
<li> <t>This term may be contrasted with "operational state" as used
<t>This term may be contrasted with "Operational State" as in <xref target="RFC8342" />. For example, the state of a link
used in <xref target="RFC8342" />. For example, might be up/down/degraded, but the operational state of the link
the state of a link might be up/down/degraded, but the o would include a collection of Values of Characteristics of the link
perational state of link would include a collection of .
Values of Characteristics of the link.</t> </t>
</li> </li>
</ul> </ul>
</dd> </dd>
<dt>Detect (hence Detected, Detection):</dt> <dt>Detect (hence Detected, Detection):</dt>
<dd><t>To notice the presence of something (State, Change, Event, a <dd><t>To notice the presence of something (State, Change, Event, a
ctivity, etc.).</t> ctivity, etc.)</t>
<ul> <ul>
<li> <li>Also to notice a Change (from the perspective of an
<t>Hence also to notice a Change (from the perspective of a observer such as a monitoring system).</li>
n observer such as a monitoring system).</t> </ul>
</li> </dd>
</ul>
</dd>
<dt>Relevance:</dt> <dt>Relevance:</dt>
<dd><t>Consideration of an Event, State, or Value (through the appl <dd><t>Consideration of an Event, State, or Value (through the
ication of policy, relative application of policy, relative to a specific perspective or intent,
to a specific perspective, intent, and in relation to other and in relation to other Events, States, and Values) to determine
Events, States, whether it is of note to the system that controls or manages the
and Values) to determine whether it is of note to the system network. Note, for example, that not all Changes are Relevant.
that controls or manages the </t>
network. Note, for example, that not all Changes are Releva <ul>
nt.</t> <li>
<ul> <t>This term may also be used as "Relevant Event", "Relevant State"
<li> , or "Relevant Value".</t>
<t>This term may also be used as "Relevant Event", "Relevant S </li>
tate", or "Relevant Value".</t> </ul>
</li> </dd>
</ul>
</dd>
<dt>Occurrence:</dt> <dt>Occurrence:</dt>
<dd><t>A Relevant Event or a particular Relevant Change.</t> <dd><t>A Relevant Event or a particular Relevant Change.</t>
<ul> <ul>
<li> <li>
<t>An Occurrence may be an aggregation or abstraction of multi <t>An Occurrence may be an aggregation or abstraction of multi
ple fine-grain Events or Changes.</t> ple fine-grained Events or Changes.
</li>
</t>
</li>
<li> <li>
<t>An Occurrence may occur at any macro or micro scale because <t>An Occurrence may occur at any macro or micro scale because
Resources are a recursive Resources are a recursive concept. An Occurrence may be perceived,
concept, and may be perceived depending on the scope of obs depending
ervation (i.e., according on the scope of observation (i.e., according to the level of
to the level of Resource recursion that is examined). That Resource recursion that is examined). That is, Occurrences,
is, Occurrences, themselves themselves, are a recursive concept.
are a recursive concept.</t> </t>
</li> </li>
</ul> </ul>
</dd> </dd>
<dt>Fault:</dt> <dt>Fault:</dt>
<dd><t>An Occurrence (i.e., an Event or a Change) that is not desir <dd><t>An Occurrence (i.e., an Event or a Change) that is not
ed/required (as it may be indicative of a current or future desired/required (as it may be indicative of a current or future
undesired State). Thus, a Fault happens at a moment in time. undesired State). Thus, a Fault happens at a moment in time. A
A Fault can potentially be associated with a Cause. See Fault can potentially be associated with a Cause. See <xref
<xref target="RFC8632" /> for a more detailed discussion of target="RFC8632" /> for a more detailed discussion of network
network faults.</t> faults.</t>
<ul> <ul>
<li> <li>
<t>Note that there is a distinction between a Fault and a P <t>Note that there is a distinction between a Fault and a Proble
roblem that depends on context. For example, in a m
connectivity service where redundancy is present, a link that depends on context. For example, in a connectivity service
down is a Problem, but from the perspective of managing the where redundancy is present, a link down is a Problem, but from
network resources, a link down is a Fault. Likewise, fo the perspective of managing the network resources, a link down is
r example, in a router with two power supplies, if the a Fault. Likewise, for example, in a router with two power
backup power supply fails leaving the primary unprotecte supplies, if the backup power supply fails leaving the primary
d, this is a Problem.</t> unprotected, this is a Problem.</t>
</li> </li>
</ul> </ul>
</dd> </dd>
<dt>Problem:</dt> <dt>Problem:</dt>
<dd><t>A State that is undesirable and that may require remedial ac <dd><t>A State that is undesirable and that may require remedial
tion. A Problem cannot action. A Problem cannot necessarily be associated with a
necessarily be associated with a Cause. The resolution of a Cause. The resolution of a Problem does not necessarily act on
Problem does not necessarily the thing that has the Problem.</t>
act on the thing that has the Problem.</t> <ul>
<ul> <li>
<li> <t>Note that there is a historic aspect to the concept of a
<t>Note that there is a historic aspect to the concept of a Problem. The current State may be operational, but there could
Problem. The current State have been a Fault that is unexplained, and the fact of that
may be operational, but there could have been a Fault th unexplained recent Fault is a Problem.</t>
at is unexplained, and </li>
the fact of that unexplained recent Fault is a Problem.< <li>
/t> <t>Note that while a Problem is unresolved it may continue to
</li> require attention. A record of resolved Problems may be
<li> maintained in a log.</t>
<t>Note that while a Problem is unresolved it may continue </li>
to require attention. A <li>
record of resolved Problems may be maintained in a log.< <t>Note that there may be a State that is considered to be a
/t> Problem from several perspectives. For example, consider a "loss
</li> of light" State that may cause multiple services to fail. In this
<li> example, a new State (the light recovers) may cause the Problem
<t>Note that there may be a State which is considered to be to be resolved from one perspective (the services are operational
a Problem from several once more) but may leave the Problem as unresolved (because the
perspectives. For example, consider a "loss of light" St loss of light has not been explained). Further, in this example,
ate that may cause multiple there could be another development (the reason for the temporary
services to fail. In this example, a new State (the ligh loss of light is traced to a microbend in the fiber that is
t recovers) may repaired) resulting in that unresolved Problem now being
cause the Problem to be resolved from one perspective (t resolved. But, in this example, this still leaves a further
he services are operational Problem unresolved (a microbend occurred, and that Problem is not
once more), but may leave the Problem as unresolved (bec resolved until it is understood how it occurred and a remedy is
ause the loss of light has put in place to prevent recurrence).</t>
not been explained). Further, in this example, there cou </li>
ld be another development </ul>
(the reason for the temporary loss of light is traced to </dd>
a microbend in the fiber
that is repaired) resulting in that unresolved Problem n
ow being resolved. But, in
this example, this still leaves a further Problem unreso
lved (a microbend occurred,
and that Problem is not resolved until it is understood
how it occurred and a remedy
is put in place to prevent recurrence).</t>
</li>
</ul>
</dd>
<dt>Cause:</dt> <dt>Cause:</dt>
<dd><t>The Events (Detected or otherwise) that gave rise to a Fault /Problem.</t></dd> <dd><t>The Events (Detected or otherwise) that gave rise to a Fault /Problem.</t></dd>
<dt>Incident:</dt> <dt>Incident:</dt>
<dd><t>A (Network) Incident is an undesired Occurrence such as an u nexpected interruption of a <dd><t>Also referred to as "Network Incident". An Incident is an un desired Occurrence such as an unexpected interruption of a
network service, degradation of the quality of a network ser vice, or the below-target network service, degradation of the quality of a network ser vice, or the below-target
performance of a network service. An Incident results from o ne or more Problems, and a performance of a network service. An Incident results from o ne or more Problems, and a
Problem may give rise to or contribute to one or more Incide nts. Problem may give rise to or contribute to one or more Incide nts.
Greater discussion of Network Incident relationships, includ ing Customer Incidents and Greater discussion of Network Incident relationships, includ ing Customer Incidents and
Incident management, can be found in <xref target="I-D.ietf- Incident management, can be found in <xref target="I-D.ietf-
nmop-network-incident-yang" />.</t></dd> nmop-network-incident-yang" />.</t>
</dd>
<dt>Symptom:</dt> <dt>Symptom:</dt>
<dd><t>An observable Value, Change, State, Event, or Condition cons idered as an indication of a <dd><t>An observable Value, Change, State, Event, or Condition cons idered as an indication of a
Problem or potential Problem.</t></dd> Problem or potential Problem.</t></dd>
<dt>Anomaly:</dt> <dt>Anomaly:</dt>
<dd><t>A (Network) Anomaly is an unusual or unexpected Event or pat tern in network data in the <dd><t>Also referred to as "Network Anomaly". An Anomaly is an unus ual or unexpected Event or pattern in network data in the
forwarding plane, control plane, or management plane that de viates from the normal, forwarding plane, control plane, or management plane that de viates from the normal,
expected behavior. See <xref target="I-D.ietf-nmop-network-a nomaly-architecture" /> expected behavior. See <xref target="I-D.ietf-nmop-network-a nomaly-architecture" />
for more details.</t></dd> for more details.</t></dd>
<dt>Alert:</dt> <dt>Alert:</dt>
<dd><t>An indication of a Fault.</t></dd> <dd><t>An indication of a Fault.</t></dd>
<dt>Alarm:</dt> <dt>Alarm:</dt>
<dd><t>As specified in <xref target="RFC8632" />, an Alarm signifie s an undesirable State in a <dd><t>As specified in <xref target="RFC8632" />, signifies an unde sirable State in a
Resource that requires corrective action. From a management point of view, Resource that requires corrective action. From a management point of view,
an Alarm can be seen as a State in its own right and the tra nsition to this State an Alarm can be seen as a State in its own right and the tra nsition to this State
may result in an Alert being issued. The receipt of this Al ert may result in an Alert being issued. The receipt of this Al ert
may give rise to a continuous indication (to a human operato r) highlighting the may give rise to a continuous indication (to a human operato r) highlighting the
potential or actual presence of a Problem.</t></dd> potential or actual presence of a Problem.</t></dd>
</dl> </dl>
</section> </section>
<section anchor="other" numbered="true" toc="default"> <section anchor="other" numbered="true" toc="default">
<name>Other Terms</name> <name>Other Terms</name>
<t>Three other terms may be helpful:</t> <t>Three other terms may be helpful:</t>
<dl newline="false" spacing="normal"> <dl newline="false" spacing="normal">
<dt>Intermittent:</dt> <dt>Intermittent:</dt>
<dd><t>A State that is not continuous, but keeps recurring in some t ime frame.</t></dd> <dd><t>A State that is not continuous but that keeps recurring in so me time frame.</t></dd>
<dt>Transient:</dt> <dt>Transient:</dt>
<dd><t>A State that is not continuous, and occurs once in some time frame.</t></dd> <dd><t>A State that is not continuous and that occurs once in some t ime frame.</t></dd>
<dt>Recurrent:</dt> <dt>Recurrent:</dt>
<dd><t>A Problem that is actively resolved, but returns.</t></dd> <dd><t>A Problem that is actively resolved but returns.</t></dd>
</dl> </dl>
</section> </section>
</section> </section>
<section anchor="explain" numbered="true" toc="default"> <section anchor="explain" numbered="true" toc="default">
<name>Workflow Explanations</name> <name>Workflow Explanations</name>
<t>This section aims to add information about the relationship between the terms defined in <t>This section aims to add information about the relationship between the terms defined in
<xref target="core" /> in the context of network fault and problem mana gement. <xref target="core" /> in the context of network fault and problem mana gement.
The text and figures here are for explanation and are not normative for the definition of terms.</t> The text and figures here are for explanation and are not normative for the definition of terms.</t>
<t>The relationship between Resources and Characteristics is shown in <t>The relationship between Resources and Characteristics is shown in
<xref target="systemfig" />. Note that there is a 1:n relationship betw <xref target="systemfig" />. Note that there is a 1:n relationship betw
een Network een a Network
system and Resources, and between Resources and Characteristics: this i system and Resources and between Resources and Characteristics: For cla
s not shown on the rity, this is not shown in the
figure for clarity.</t> figure.</t>
<figure anchor="systemfig"> <figure anchor="systemfig">
<name>Resources and Characteristics</name> <name>Resources and Characteristics</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[ Characteristics
Characteristics ^
^ |
| Resources
Resources ^
^ |
| Network system
Network system ]]></artwork>
]]>
</artwork>
</figure> </figure>
<t>The Value of a Characteristic of a Resource may change over time. Specif ic <t>The Value of a Characteristic of a Resource may change over time. Specif ic
Changes in Value may be noticed at a specific time (as digital Changes), Detected, and Changes in Value may be noticed at a specific time (as digital Changes), Detected, and
treated as Events. This is shown on the left of <xref target="characterf ig" />.</t> treated as Events. This is shown on the left-hand side of <xref target=" characterfig" />.</t>
<t>The center of <xref target="characterfig" /> shows how the Value of a Ch aracteristic <t>The center of <xref target="characterfig" /> shows how the Value of a Ch aracteristic
may change over time. The Value may be Detected at specific times or per iodically may change over time. The Value may be Detected at specific times or per iodically
and give rise to Conditions that are States (and consequently State Chan ges).</t> and give rise to Conditions that are States (and consequently State Chan ges).</t>
<t>In practice, the Characteristic may vary in an analog manner over time a s shown on the <t>In practice, the Characteristic may vary in an analog manner over time a s shown on the
right-hand side of <xref target="characterfig" />. The Value can be read or reported right-hand side of <xref target="characterfig" />. The Value can be read or reported
(i.e., Detected) periodically leading to analog Values that may be deeme d Relevant Values, (i.e., Detected) periodically leading to analog Values that may be deeme d Relevant Values,
or may be evaluated over time as shown in <xref target="thresholdfig" /> or it may be evaluated over time as shown in <xref target="thresholdfig"
.</t> />.
</t>
<figure anchor="characterfig"> <figure anchor="characterfig">
<name>Characteristics and Changes</name> <name>Characteristics and Changes</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[
Event State Value Event State Value
Condition Condition
^ ^ ^ ^ ^ ^
Detect : Detect : Detect : Detect : Detect : Detect :
: : : : : :
^ ^ ^ ^ ^ /\ ^ ^ ^ ^ ^ /\
: : : : : / \ : : : : : / \
: : : : : /\ / \ : : : : : /\ / \
__ __ _____ / \/ __ __ _____ / \/
| | | | /\/ | | | | /\/
__| |__ ____| |____ / __| |__ ____| |____ /
Change at a time Change over time Change over time Change at a time Change over time Change over time
]]> ]]></artwork>
</artwork>
</figure> </figure>
<t><xref target="eventfig" /> shows the workflow progress for Events. As no ted above, an <t><xref target="eventfig" /> shows the workflow progress for Events. As no ted above, an
Event is a Change in the Value of a Characteristic at a time. The Event may be Event is a Change in the Value of a Characteristic at a time. The Event may be
evaluated (considering policy, relative to a specific perspective, with a evaluated (considering policy, relative to a specific perspective, with a
view to intent, and in relation to other Events, States, and Values) to determine if view to intent, and in relation to other Events, States, and Values) to determine if
it is an Occurrence and possibly to indicate a Change of State. An Occur rence may be it is an Occurrence and possibly to indicate a Change of State. An Occur rence may be
undesirable (a Fault) and that can cause an Alert to be generated, may b e evidence undesirable (a Fault), which might cause an Alert to be generated. Or, a n Occurrence may be evidence
of a Problem and could directly indicate a Cause. In some cases, an Aler t may give of a Problem and could directly indicate a Cause. In some cases, an Aler t may give
rise to an Alarm highlighting the potential or actual presence of a Prob rise to an Alarm highlighting the potential or actual presence of a Prob
lem.</t> lem.
</t>
<figure anchor="eventfig"> <figure anchor="eventfig">
<name>Event and Dependent Terms</name> <name>Event and Dependent Terms</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[
Alert - - - > Alarm Alert - - - > Alarm
^ ^
| |
| -----> Cause | -----> Cause
| | | |
|----------> Problem |----------> Problem
| |
| |
Fault Fault
^ ^
| |
| |
| |
Occurrence Occurrence
^ ^
| |
|----------> State |----------> State
| |
| |
Event Event
]]> ]]></artwork>
</artwork>
</figure> </figure>
<t>Parallel to the workflow for Events, <xref target="statefig" /> shows th e <t>Parallel to the workflow for Events, <xref target="statefig" /> shows th e
workflow progress for States. As shown in <xref target="characterfig" /> , workflow progress for States. As shown in <xref target="characterfig" /> ,
Change noted at a particular time gives rise to State. The State may be Change noted at a particular time gives rise to State. The State may be
deemed to have Relevance considering policy, relative to a specific pers pective, deemed to have Relevance considering policy, relative to a specific pers pective,
with a view to intent, and in relation to other Events, States, and Valu es. with a view to intent, and in relation to other Events, States, and Valu es.
A Relevant State may be deemed a Problem, or may indicate a Problem or A Relevant State may be deemed a Problem, or it may indicate a Problem o
potential Problem.</t> r
potential Problem.
</t>
<t>Problems may be considered based on Symptoms and may map directly or <t>Problems may be considered based on Symptoms and may map directly or
indirectly to Causes. An Incident results from one or more Problems. An Alarm may be indirectly to Causes. An Incident results from one or more Problems. An Alarm may be
raised as the result of a Problem, and the transition to an Alarmed stat raised as the result of a Problem, and the transition to an alarmed Stat
e may e may
give rise to an Alert.</t> give rise to an Alert.
</t>
<figure anchor="statefig"> <figure anchor="statefig">
<name>State and Dependent Terms</name> <name>State and Dependent Terms</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[
Alarm - - -> Alert Alarm - - -> Alert
^ ^
| ------> Incident | ------> Incident
| | | |
| | ---> Cause | | ---> Cause
| | | | | |
Problem---------> Symptom Problem---------> Symptom
^ ^
| |
| Relevance | Relevance
| |
| |
State State
]]> ]]></artwork>
</artwork>
</figure> </figure>
<t><xref target="consolidationfig" /> shows how Faults and Problems <t><xref target="consolidationfig" /> shows how Faults and Problems
may be consolidated to determine the Causes. The arrows show how may be consolidated to determine the Causes. The arrows show how
one item may give rise to another.</t> one item may give rise to another.</t>
<t>A Cause can be indicated by or determined from Faults, Problems, and Sym ptoms. <t>A Cause can be indicated by or determined from Faults, Problems, and Sym ptoms.
It may be that one Cause points to another, and can also be considered a s a It may be that one Cause points to another, and it can also be considere d as a
Symptom. The determination of Causes can consider multiple inputs. An In cident Symptom. The determination of Causes can consider multiple inputs. An In cident
results from one or more Problems.</t> results from one or more Problems.</t>
<figure anchor="consolidationfig"> <figure anchor="consolidationfig">
<name>Consolidation of Symptoms and Causes</name> <name>Consolidation of Symptoms and Causes</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[
--------- ---------
------------- | | ------------- | |
| ----------> | Symptom | | ----------> | Symptom |
| | | | | | | |
| | --------- | | ---------
v | ^ v | ^
--------- | --------- |
------->| Cause |<--------- | ------->| Cause |<--------- |
| --------- | | | --------- | |
| ^ | | | | ^ | | |
| | | | | | | | | |
| --- | | | --- | |
| | | | | |
--------- --------- ---------- --------- --------- ----------
| Fault |------------------->| Problem |------->| Incident | | Fault |------------------->| Problem |------->| Incident |
--------- --------- ---------- --------- --------- ----------
]]> ]]></artwork>
</artwork>
</figure> </figure>
<t><xref target="thresholdfig" /> shows <t><xref target="thresholdfig" /> shows
how thresholds are important in the consideration of analog Values and E vents. how thresholds are important in the consideration of analog Values and E vents.
The arrows in the figure show how one item may give rise to or utilize a nother. The arrows in the figure show how one item may give rise to or utilize a nother.
The use of threshold-driven Events and States (and the Alerts that The use of threshold-driven Events and States (and the Alerts that
they might give rise to) must be treated with caution to dampen any "fla pping" they might give rise to) must be treated with caution to dampen any "fla pping"
(so that consistent States may be observed) and to avoid overwhelming ma nagement (so that consistent States may be observed) and to avoid overwhelming ma nagement
processes or systems. Analog Values may be read or notified from the Res ource processes or systems. Analog Values may be read or notified from the Res ource
and could transition a threshold, be deemed Relevant Values, or evaluate d over and could transition a threshold, be deemed Relevant Values, or be evalu ated over
time. Events may be counted, and the Count may cross a threshold or time. Events may be counted, and the Count may cross a threshold or
reach a Relevant Value.</t> reach a Relevant Value.</t>
<t>The Threshold Process may be implementation-specific and subject to poli cies. <t>The Threshold Process may be implementation specific and subject to poli cies.
When a threshold is crossed and any other conditions are matched, an Eve nt When a threshold is crossed and any other conditions are matched, an Eve nt
may be determined, and treated like any other Event.</t> may be determined and treated like any other Event.
</t>
<figure anchor="thresholdfig"> <figure anchor="thresholdfig">
<name>Counts, Thresholds, and Values</name> <name>Counts, Thresholds, and Values</name>
<artwork align="center" name="" type="" alt=""> <artwork align="center" name="" type="" alt=""><![CDATA[
<![CDATA[
Occurrence Occurrence
^ ^
| |
|---------------------> State |---------------------> State
| |
| ------- Relevance | ------- Relevance
|------>| Count |-----------------------------> Value |------>| Count |-----------------------------> Value
| ------- | ^ | ------- | ^
| | | | | | | |
| | | | Relevance | | | | Relevance
skipping to change at line 679 skipping to change at line 708
| ----------- | | | | ----------- | | |
| | Threshold | | | | | | Threshold | | | |
|<----| Process |<------ | | |<----| Process |<------ | |
| | |<----------------------| | | | |<----------------------| |
| ----------- ---------------- | ----------- ----------------
| ^ | ^
| | | |
| Detect Detect | | Detect Detect |
| | | |
Change at a Time Change over Time Change at a Time Change over Time
]]> ]]></artwork>
</artwork>
</figure> </figure>
</section> </section>
<section anchor="security-considerations" numbered="true" toc="default"> <section anchor="security-considerations" numbered="true" toc="default">
<name>Security Considerations</name> <name>Security Considerations</name>
<t>This document specifies terminology and has no direct effect on the sec urity of <t>This document specifies terminology and has no direct effect on the sec urity of
implementations or deployments. However, protocol solutions and managem ent models implementations or deployments. However, protocol solutions and managem ent models
need to be aware of several aspects:</t> need to be aware of several aspects:</t>
<ul> <ul>
<li> <li>
<t>The exposure of information pertaining to Faults and Problems may m ake available knowledge <t>The exposure of information pertaining to Faults and Problems may m ake available knowledge
of the internal workings of a network (in particular its vulnerabil ities) that of the internal workings of a network (in particular, its vulnerabi lities) that
may be of use to an attacker.</t> may be of use to an attacker.</t>
</li> </li>
<li> <li>
<t>Systems that generate management information (messages, notificatio ns, etc.) when <t>Systems that generate management information (messages, notificatio ns, etc.) when
Faults occur, may be attacked by causing them to generate so much i nformation Faults occur may be attacked by causing them to generate so much in formation
that the system that manages the network is swamped and unable to p roperly manage that the system that manages the network is swamped and unable to p roperly manage
the network.</t> the network.</t>
</li> </li>
<li> <li>
<t>Reporting false information about Faults (or masking reports of Fau lts) may <t>Reporting false information about Faults (or masking reports of Fau lts) may
cause the system that manages the network to function incorrectly.< /t> cause the system that manages the network to function incorrectly.< /t>
</li> </li>
</ul> </ul>
</section> </section>
skipping to change at line 722 skipping to change at line 750
<section anchor="privacy-considerations" numbered="true" toc="default"> <section anchor="privacy-considerations" numbered="true" toc="default">
<name>Privacy Considerations</name> <name>Privacy Considerations</name>
<t>Network fault and problem management should preserve user privacy by <t>Network fault and problem management should preserve user privacy by
not exposing user data or information about end-user activities.</t> not exposing user data or information about end-user activities.</t>
<t>Network Telemetry involves observing network traffic and collecting <t>Network Telemetry involves observing network traffic and collecting
operational data from the network, while Network Monitoring is the operational data from the network, while Network Monitoring is the
process of keeping records of data gathered in Network Telemetry. process of keeping records of data gathered in Network Telemetry.
Therefore, it is possible that the data observed and collected Therefore, it is possible that the data observed and collected
includes users&apos; privacy information. Such information must be includes users' privacy information. Such information must be
protected and controlled to avoid exposure to unauthorised parties. protected and controlled to avoid exposure to unauthorized parties.
Particular care may need to be exercised over stores of such Particular care may need to be exercised over stores of such
information which might be accessed at any time (including far into information that might be accessed at any time (including far into
the future).</t> the future).
</t>
<t>Additionally, a network operator will be concerned to keep control of <t>Additionally, a network operator will be concerned about keeping contro l of
all information about Faults to protect their own privacy and the all information about Faults to protect their own privacy and the
details of how they operate their network.</t> details of how they operate their network.</t>
</section> </section>
<section anchor="iana-considerations" numbered="true" toc="default"> <section anchor="iana-considerations" numbered="true" toc="default">
<name>IANA Considerations</name> <name>IANA Considerations</name>
<t>This document makes no requests for IANA action.</t> <t>This document has no IANA actions.</t>
</section>
<section anchor="acknowledgments" numbered="false" toc="default">
<name>Acknowledgments</name>
<t>The authors would like to thank Med Boucadair, Wanting Du, Joe Clarke,
Javier Antich, Benoit Claise, Christopher Janz,
Sherif Mostafa, Kristian Larsson, Dirk Hugo, Carsten Bormann, Hilarie O
rman, Stewart Bryant, Bo Wu, Paul Kyzivat,
Jouni Korhonen, Reshad Rahman, Rob Wilton, Mahesh Jethanandani, Tim Bra
y, Paul Aitken, and Deb Cooley for their helpful comments.</t>
<t>Special thanks to the team that met at a side meeting at IETF-120 to di
scuss some of the thorny issues:</t>
<ul spacing="compact">
<li>Benoit Claise</li>
<li>Watson Ladd</li>
<li>Brad Peters</li>
<li>Bo Wu</li>
<li>Georgios Karagiannis</li>
<li>Olga Havel</li>
<li>Vincenzo Riccobene</li>
<li>Yi Lin</li>
<li>Jie Dong</li>
<li>Aihua Guo</li>
<li>Thomas Graf</li>
<li>Qin Wu</li>
<li>Chaode Yu</li>
<li>Adrian Farrel</li>
</ul>
</section> </section>
</middle> </middle>
<back> <back>
<displayreference target="I-D.ietf-nmop-network-anomaly-architecture" to="Net-An
omaly-Arch"/>
<displayreference target="I-D.ietf-nmop-network-incident-yang" to="Net-Incident-
Mgmt-YANG"/>
<references> <references>
<name>Informative References</name> <name>Informative References</name>
&RFC3877; <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.387
&RFC6632; 7.xml"/>
&RFC8342; <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.663
&RFC8632; 2.xml"/>
&RFC9232; <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.834
&RFC9315; 2.xml"/>
&RFC9417; <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.863
2.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.923
2.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.931
5.xml"/>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.941
7.xml"/>
&I-D.ietf-nmop-network-anomaly-architecture; <!-- draft-ietf-nmop-network-anomaly-architecture (I-D Exists)
&I-D.ietf-nmop-network-incident-yang; (Did "long way" to fix Alex Huang Feng's surname) -->
<reference anchor="I-D.ietf-nmop-network-anomaly-architecture">
<front>
<title>A Framework for a Network Anomaly Detection Architecture</title>
<author initials="T." surname="Graf" fullname="Thomas Graf">
<organization>Swisscom</organization>
</author>
<author initials="W." surname="Du" fullname="Wanting Du">
<organization>Swisscom</organization>
</author>
<author initials="P." surname="Francois" fullname="Pierre Francois">
<organization>INSA-Lyon</organization>
</author>
<author initials="A." surname="Huang Feng" fullname="Alex Huang Feng">
<organization>INSA-Lyon</organization>
</author>
<date month="November" day="21" year="2025" />
</front>
<seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-anomaly-arch
itecture-06" />
</reference>
<!-- draft-ietf-nmop-network-incident-yang (I-D Exists) -->
<xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ie
tf-nmop-network-incident-yang.xml"/>
</references> </references>
<section anchor="acknowledgments" numbered="false" toc="default">
<name>Acknowledgments</name>
<t>The authors would like to thank <contact fullname="Med Boucadair"/>,
<contact fullname="Wanting Du"/>, <contact fullname="Joe Clarke"/>,
<contact fullname="Javier Antich"/>, <contact fullname="Benoit
Claise"/>, <contact fullname="Christopher Janz"/>, <contact
fullname="Sherif Mostafa"/>, <contact fullname="Kristian Larsson"/>,
<contact fullname="Dirk Von Hugo"/>, <contact fullname="Carsten Bormann"/>
,
<contact fullname="Hilarie Orman"/>, <contact fullname="Stewart
Bryant"/>, <contact fullname="Bo Wu"/>, <contact fullname="Paul
Kyzivat"/>, <contact fullname="Jouni Korhonen"/>, <contact
fullname="Reshad Rahman"/>, <contact fullname="Rob Wilton"/>, <contact
fullname="Mahesh Jethanandani"/>, <contact fullname="Tim Bray"/>,
<contact fullname="Paul Aitken"/>, and <contact fullname="Deb Cooley"/>
for their helpful comments.
</t>
<t>Special thanks to the team that met at a side meeting at IETF 120 to
discuss some of the thorny issues:</t>
<ul spacing="compact">
<li><t><contact fullname="Benoit Claise"/></t></li>
<li><t><contact fullname="Watson Ladd"/></t></li>
<li><t><contact fullname="Brad Peters"/></t></li>
<li><t><contact fullname="Bo Wu"/></t></li>
<li><t><contact fullname="Georgios Karagiannis"/></t></li>
<li><t><contact fullname="Olga Havel"/></t></li>
<li><t><contact fullname="Vincenzo Riccobene"/></t></li>
<li><t><contact fullname="Yi Lin"/></t></li>
<li><t><contact fullname="Jie Dong"/></t></li>
<li><t><contact fullname="Aihua Guo"/></t></li>
<li><t><contact fullname="Thomas Graf"/></t></li>
<li><t><contact fullname="Qin Wu"/></t></li>
<li><t><contact fullname="Chaode Yu"/></t></li>
<li><t><contact fullname="Adrian Farrel"/></t></li>
</ul>
</section>
</back> </back>
</rfc> </rfc>
 End of changes. 79 change blocks. 
370 lines changed or deleted 383 lines changed or added

This html diff was produced by rfcdiff 1.48.